What Drives Information Security Policy Violations among Banking Employees? Insights from Neutralization and Social Exchange Theory

被引:23
|
作者
Teh, Pei-Lee [1 ]
Ahmed, Pervaiz K. [1 ]
D'Arcy, John [2 ]
机构
[1] Monash Univ, Sch Business, Bandar Sunway, Malaysia
[2] Univ Delaware, Dept Accounting & MIS, Newark, DE USA
关键词
Information Security; Job Satisfaction; Neutralization Theory; Organizational Commitment; Role Conflict; Role Ambiguity; Social Exchange Theory; JOB-SATISFACTION; ORGANIZATIONAL COMMITMENT; SYSTEMS SECURITY; BEHAVIORAL-RESEARCH; COMPUTER ABUSE; DETERRENCE; AMBIGUITY; MODEL; INTENTIONS; AWARENESS;
D O I
10.4018/jgim.2015010103
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Employees' information security policy (ISP) violations are a major problem that plagues organizations worldwide, particularly in the banking/financial sector. Research shows that employees use neutralization techniques to rationalize their ISP violating behaviors; it is therefore important to understand what leads to and influences these neutralization techniques. The authors' study draws upon social exchange theory to develop a set of factors that drive employees' neutralization of ISP violations. The model specifies previously untested relationships between job satisfaction, organizational commitment, role conflict, role ambiguity, and neutralization techniques. Using a sample of Malaysian banking employees, the authors found a positive relationship between role conflict and neutralization of ISP violations, whereas organizational commitment was negatively related to neutralization in this context. The authors' findings offer fresh insights for scholars and practitioners in dealing with the problem of employees' intentional ISP violations while extending the reach of neutralization theory beyond North American and European cultures.
引用
收藏
页码:44 / 64
页数:21
相关论文
共 4 条
  • [1] NEUTRALIZATION: NEW INSIGHTS INTO THE PROBLEM OF EMPLOYEE INFORMATION SYSTEMS SECURITY POLICY VIOLATIONS
    Siponen, Mikko
    Vance, Anthony
    [J]. MIS QUARTERLY, 2010, 34 (03) : 487 - 502
  • [2] Investigation of information security policy violations among oil and gas employees: A security-related stress and avoidance coping perspective
    Ali, Rao Faizan
    Dominic, P. D. D.
    [J]. JOURNAL OF INFORMATION SCIENCE, 2024, 50 (01) : 254 - 272
  • [3] Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis
    Duy Dang-Pham
    Kautz, Karlheinz
    Ai-Phuong Hoang
    Pittayachawan, Siddhi
    [J]. COMPUTERS & SECURITY, 2022, 112
  • [4] What makes UGC more popular on social media platforms? Insights from information adoption theory
    Zhuang, Wei
    Zeng, Qingfeng
    Zhang, Yu
    Lin, Dijia
    Fan, Weiguo
    [J]. BEHAVIOUR & INFORMATION TECHNOLOGY, 2024,